SlideShare uma empresa Scribd logo
1 de 36
Eagle Technologies, Inc. © Copyright 2015
Designing a Modern Disaster Recovery Environment
Balancing cost, risk and complexity in your DR strategy.
Brian Anderson, Senior Systems Engineer
Eagle Technologies, Inc. © Copyright 2015
• The importance of DR
• Business Continuity ≠ Disaster Recovery
• Recovery Objectives
• Common DR Technologies
• DR Strategies & the 3-2-1
• DR as an Insurance Policy
• Recovery Service Catalog
• DR Design Tips & Takeaways
Overview
Eagle Technologies, Inc. © Copyright 2015
• Natural disasters cause the most
catastrophic data losses:
– Hurricane Katrina and Sandy
– Tornado Alley, Moore OK – 1,274 in US each
year
– Fires, floods, earthquakes
– Only way to recover is to store a copy of data
in a physically separate location
• Hardware failure, human error
and software corruption still
make up 82% of data losses
Disasters are on the rise.
Is your data center protected?
Eagle Technologies, Inc. © Copyright 2015
Recovery Site Strategies
Eagle Technologies, Inc. © Copyright 2015
Why DR?
• The nature of disasters is that they are usually
unexpected.
• An organization which fails to provide a minimum
level of service to customers following a disaster
may not have a business to recover.
– Lost revenue
– Damage to brand/reputation
– Reduced customer satisfaction
– Lost market presence
– Walking papers
• SANsplosion 2012!
Eagle Technologies, Inc. © Copyright 2015
The Cost of Downtime
Source: Datacenter Downtime: How Much Does It Really Cost?, Aberdeen Group, March 2012
Eagle Technologies, Inc. © Copyright 2015
Data Protection Priorities & Spending
Top 10 IT Priorities for 2014
Priority Percent
Server Virtualization 54%
DR / Business Continuity 46%
Smartphones 41%
Tablets / PCs 41%
Business Intelligence / Analytics 39%
Mobility 39%
Network management / monitoring 38%
Network-based Security 37%
Virtual Server Backup 37%
Encryption 36%
IT Budget Growth for 2014
Priority Percent
Increase by more than 10% 22%
Increase by 5% to 10% 28%
Increase by less than 5% 10%
Same 28%
Decrease by less than 5% 3%
Decrease by 5% to 10% 5%
Decrease by more than 10% 4%
Source: CIO Magazine
Eagle Technologies, Inc. © Copyright 2015
• Business Continuity Planning - A business continuity
plan specifies how a company plans to restore core
business operations when disasters occur.
• Disaster Recovery - Disaster recovery looks specifically
at the technical aspects of how a company can get back
into operation using backup facilities.
The IT department, with its disaster recovery plan, is one
element of a larger business continuity scenario.
Business Continuity ≠ Disaster
Recovery
Eagle Technologies, Inc. © Copyright 2015
Eagle Technologies, Inc. © Copyright 2015
RPO vs. RTO
•Amount of data loss
acceptable
•The point to which data
must be restored
RECOVERY POINT
OBJECTIVE
•Amount of time it takes
to come back online
•The time by which data
must be restored
RECOVERY TIME
OBJECTIVE
Days MinsHrsWks Secs
Recovery Point
Mins DaysHrsSecs Wks
Recovery Time
Interruption
Eagle Technologies, Inc. © Copyright 2015
RPO vs. RTO
Days MinsHrsWks Secs
Recovery Point
Mins DaysHrsSecs Wks
Recovery Time
Costs
Eagle Technologies, Inc. © Copyright 2015
Technology Synchronous/
Semi-Sync
Replication
Software-
defined
Traditional
Snapshot
Replication
Traditional
Disk-based
Backups
Restores from
Tape or Public
Cloud
Application
Business
Criticality
Business
Critical
Applications
Business
Sensitive
Applications
Business
Sensitive
Applications
Business
Sensitive
Applications
Non-Critical
Applications
Disaster RPO 0-15 minutes 0-60 minutes Snap
frequency
based 4-24 hrs
Backup
frequency
based 6-24
hours
36 hours
Disaster RTO Less than 4
hours
Less than 4
hours
4-24 hours 12-72 hours Best Effort
Relative Cost $$$$ $$$ $$$ $$ $
Common DR Technologies
Eagle Technologies, Inc. © Copyright 2015
Synchronous/Semi-Sync Replication
• Typically array-based
• The most aggressive RPO capable solutions
• Highest cost and bandwidth requirements
• Still requires traditional backup for day-to-day recovery
Technology Array-Based
Replication
Application
Business
Criticality
Business
Critical
Applications
Disaster RPO 0-15 minutes
Disaster RTO Less than 4
hours
Relative Cost $$$$
Eagle Technologies, Inc. © Copyright 2015
Software-defined Replication
• Allows you to decouple replication process from
hardware.
• Solution may include DR workflow automation
• May add additional costs and complexity.
• Does not provide true technology gap.
Technology vSphere or
Software-
based
Replication
Application
Business
Criticality
Business
Sensitive
Applications
Disaster RPO 0-60 minutes
Disaster RTO Less than 4
hours
Relative Cost $$$
Eagle Technologies, Inc. © Copyright 2015
Traditional Snapshot-based Replication
• Cost effective alternative to sync/async array-based
replication.
• Low recovery time and minimal data loss.
• Snapshots can also provide operational recovery
capabilities that can integrate with backup processes.
• Typically WAN efficient, this type of replication may
include dedupe capabilities
Technology Replicated
Snapshots
Application
Business
Criticality
Business
Sensitive
Applications
Disaster RPO Snap
frequency
based 4-24 hrs
Disaster RTO 12-72 hours
Relative Cost $$$
Eagle Technologies, Inc. © Copyright 2015
Traditional Backups (Disk)
• Provides the most flexibility and value
• Fulfill the “technology gap” requirement
• A cost effective method for maintaining a large number
of recovery points and high retention
Technology Disk-based
Backups
Application
Business
Criticality
Business
Sensitive
Applications
Disaster RPO Backup
frequency
based 6-24
hours
Disaster RTO 12-72 hours
Relative Cost $$
Eagle Technologies, Inc. © Copyright 2015
• Tape is not dead!
• May still have legitimate place in your data
protection scheme
• Excellent way to get data offsite
• Certain situations may dictate tape
– Poor WAN connectivity/bandwidth
– Lack of a warm/hot site
• Keep a copy onsite, take another copy offsite
• Recovering large datasets may take a significant
amount of time.
Traditional Backups (Tape)
Technology Restores from
Tape
Application
Business
Criticality
Non-Critical
Applications
Disaster RPO 36 hours
Disaster RTO Best Effort
Relative Cost $
Eagle Technologies, Inc. © Copyright 2015
• Bandwidth is a huge factor in the success of cloud
backup & restore.
– Recovering large datasets may take a significant amount of
time.
• Performance & privacy issues remain.
• Potential hidden costs compared to alternatives
(not necessarily the lowest cost)
Public Cloud Backup
Technology Restores from
Cloud
Application
Business
Criticality
Non-Critical
Applications
Disaster RPO 36 hours
Disaster RTO Best Effort
Relative Cost $
Eagle Technologies, Inc. © Copyright 2015
Disaster Recovery Strategies
Lots of options!
• Tapes onsite
• Tapes in the boss's garage (or Iron Mountain)
• Replicate data to your DR site
• Replicate data to a third-party data center (CoLo, IaaS)
• Back up data to the cloud
• Software replication between dissimilar SAN hardware
Eagle Technologies, Inc. © Copyright 2015
Days MinsHrsWks Secs Mins DaysHrsSecs Wks
Determining Your Recovery Needs
Recovery Point Recovery Time
Tape/Cloud
Restore
Clustering
Snapshots
Sync/Semi-Sync
Replication
Tape/Cloud
Backup
Disk-based
Backups
Periodic
Snapshots &
Replication
Disk-
based
Backups
Eagle Technologies, Inc. © Copyright 2015
The “3–2–1” Strategy
• Keep your data in 3places
• Keep your data on 2disparate types of
hardware/software/firmware
– ”Technology Gap”
• Keep 1copy of your data offsite
Eagle Technologies, Inc. © Copyright 2015
The “3–2–1” Strategy
Eagle Technologies, Inc. © Copyright 2015
Eagle Technologies, Inc. © Copyright 2015
• Risk Management
– Avoid
– Mitigate
– Transfer
– Accept
• What is the cost of being out of business (30 minutes, 4 hours, 72 hours)?
– Calculate the cost of downtime in your organization.
• DR solutions need to make business sense.
– Would you spend 1 million dollars on an insurance policy that pays 1 million dollars?
• Don’t flush your IT budget down the toilet!
DR is an Insurance Policy
Eagle Technologies, Inc. © Copyright 2015
Cost of DR
No RecoveryLow Downtime
High
Cost
Low
Cost
Minimize Cost!
Eagle Technologies, Inc. © Copyright 2015
• 80% of surveyed environments
indicated that data needs to be
restored within 72 hours
• 34% of surveyed environments
indicated that data needs to be
restored within 4 hours
• Balancing cost against RTO
requires understanding of your
application’s RTO/RPO
requirements
Defining Recovery Objectives
2012
Gartner, Survey Analysis: IT Disaster Recovery Management Spending and Testing Activities Expand in 2012
Eagle Technologies, Inc. © Copyright 2015
Align your business needs with your backup and DR solutions.
• Define your business critical applications & services.
– What services are core to your business (customer facing, revenue generating)?
– Lost revenue = critical systems
• Work with stakeholders to define:
– How long of a service disruption you can suffer through?
– How much data could you afford to lose?
• Define tiers for your services (RTO & RPO)
– What effect would an outage have on your business (1 hour, 4 hours, 72 hours)?
Recovery Service Catalog
Eagle Technologies, Inc. © Copyright 2015
– Strive to have as few tiers as possible
• Time and money always accompany complexity
– Document your risks and plan.
• Get approval from up the chain.
– Maintain your plan
• Assign a senior-level position
• Regular tests and reviews are important
– A solid recovery service catalog enables other components of DR
planning
• Forces discussions about Business Continuity
• Recovery Priorities
• Run Book
Recovery Service Catalog(cont.)
Eagle Technologies, Inc. © Copyright 2015
1. Identify Services
2. Analyze Business Impact
3. Evaluate & Choose Recovery Objectives
4. Document
5. Get Approval
6. Implement
7. Maintain
 Test, Test, Test!
Recovery Service Catalog(cont.)
Eagle Technologies, Inc. © Copyright 2015
DR Design Tips
• Unified Backup/Management
– Islands of disparate technology are an operational obstacle for maintaining and
managing DR
– Point solutions create complexity and uncertainty
• Reduced storage consumption with shared indexes and deduplication
databases
– Enable disk-based backups with long-term retention
• Management tool must be flexible to business change
– Be as prepared as you can be to support new applications and services
Eagle Technologies, Inc. © Copyright 2015
• Pre-position data
– Datasets are getting too large for alternate methods
• Automate DR workflows when possible
– If not, create a run book documenting steps
• Align with a technology partner that is invested in your
DR success
– I have one I can recommend ;)
DR Design Tips(cont.)
Eagle Technologies, Inc. © Copyright 2015
Takeaways
• If you work in IT long enough, you will encounter a large-scale outage.
– Be prepared!
• Business Continuity is not the same as DR
– Encourage your organization at large to build a business continuity plan.
• Understand recovery objectives and the methodstechnologies that enable your
business to meet them.
• Simplify whenever and wherever you can!
– Unify the backup & restore process, this includes the management of those technologies that enable DR.
– Workflow, automation, run books… these are your friends. 
Eagle Technologies, Inc. © Copyright 2015
Takeaways (cont)
• Consider the danger of incremental decisions over time
– Build a blueprint and attempt to stick to it.
• Don’t forget the 3-2-1!
– Data in 3 places,
– on two disparate pieces of hardware/software,
– with at least one copy off-site.
• DR is an insurance policy!
– You need to spend wisely.
– Calculate the cost of downtime for your organization.
– Building a recovery service catalog will enable you to make wise decisions.
Eagle Technologies, Inc. © Copyright 2015
Got questions?
We’ve got answers.
35
Eagle Technologies, Inc. © Copyright 2015
Thank you!
Brian Anderson
Senior Systems Engineer
brian.anderson@eagleinc.com
Eagle Technologies, Inc. © Copyright 2015
We’re making technology easy.

Mais conteúdo relacionado

Mais procurados

Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016Amazon Web Services
 
Cloud migration risk
Cloud migration riskCloud migration risk
Cloud migration riskEdgevalue
 
Cedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Consulting
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak
 
Virtualization to Cloud with SDDC Operations Management and Service Provisioning
Virtualization to Cloud with SDDC Operations Management and Service ProvisioningVirtualization to Cloud with SDDC Operations Management and Service Provisioning
Virtualization to Cloud with SDDC Operations Management and Service ProvisioningVMware
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital TransformationHybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital TransformationPT Datacomm Diangraha
 
Cloud migration
Cloud migrationCloud migration
Cloud migrationRaj Raj
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
Emerging Cloud Migration Approaches
Emerging Cloud Migration ApproachesEmerging Cloud Migration Approaches
Emerging Cloud Migration ApproachesArvind Viswanathan
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013David Linthicum
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Cloudera, Inc.
 
Cloud migration
Cloud migrationCloud migration
Cloud migrationMark Swick
 
How Email as a Service Can Remove Your Operation Pain
How Email as a Service Can Remove Your Operation PainHow Email as a Service Can Remove Your Operation Pain
How Email as a Service Can Remove Your Operation PainPT Datacomm Diangraha
 
PaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with AltusPaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with AltusCloudera, Inc.
 

Mais procurados (20)

8.cloud migration
8.cloud migration8.cloud migration
8.cloud migration
 
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
 
Cloud migration risk
Cloud migration riskCloud migration risk
Cloud migration risk
 
Cedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahonCedar Day 2018 - Cloud IaaS - Ken MacMahon
Cedar Day 2018 - Cloud IaaS - Ken MacMahon
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
 
Virtualization to Cloud with SDDC Operations Management and Service Provisioning
Virtualization to Cloud with SDDC Operations Management and Service ProvisioningVirtualization to Cloud with SDDC Operations Management and Service Provisioning
Virtualization to Cloud with SDDC Operations Management and Service Provisioning
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital TransformationHybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Emerging Cloud Migration Approaches
Emerging Cloud Migration ApproachesEmerging Cloud Migration Approaches
Emerging Cloud Migration Approaches
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
How Email as a Service Can Remove Your Operation Pain
How Email as a Service Can Remove Your Operation PainHow Email as a Service Can Remove Your Operation Pain
How Email as a Service Can Remove Your Operation Pain
 
PaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with AltusPaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with Altus
 

Destaque

White Paper on Disaster Recovery in Geographically dispersed cross site virtu...
White Paper on Disaster Recovery in Geographically dispersed cross site virtu...White Paper on Disaster Recovery in Geographically dispersed cross site virtu...
White Paper on Disaster Recovery in Geographically dispersed cross site virtu...EMC Forum India
 
Micro Datacenters Venema Advies Nigeria Limited
Micro Datacenters Venema Advies Nigeria LimitedMicro Datacenters Venema Advies Nigeria Limited
Micro Datacenters Venema Advies Nigeria LimitedDick Venema
 
Srdf overview latency_v.5
Srdf overview latency_v.5Srdf overview latency_v.5
Srdf overview latency_v.5jas3399
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloudsolarisyourep
 
Disaster Recovery Deep Dive
Disaster Recovery Deep DiveDisaster Recovery Deep Dive
Disaster Recovery Deep DiveLiberteks
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity CapabilityRod Davis
 
Disaster Recovery- A Case Study
Disaster Recovery- A Case StudyDisaster Recovery- A Case Study
Disaster Recovery- A Case Studyoneneckitservices
 
Reference Architecture for Shared Services Hosting_SunilBabu_V2.0
Reference Architecture for Shared Services Hosting_SunilBabu_V2.0Reference Architecture for Shared Services Hosting_SunilBabu_V2.0
Reference Architecture for Shared Services Hosting_SunilBabu_V2.0Sunil Babu
 
Implementing sql server always on
Implementing sql server always onImplementing sql server always on
Implementing sql server always onSarabpreet Anand
 
Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...
Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...
Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...EMC Forum India
 
Business Continuity Knowledge Share
Business Continuity Knowledge ShareBusiness Continuity Knowledge Share
Business Continuity Knowledge Share.Gastón. .Bx.
 
IT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business ContinuityIT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business ContinuitySteve Susina
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankCloudEndure
 
Quantitive Time Series Analysis of Malware and Vulnerability Trends
Quantitive Time Series Analysis of Malware and Vulnerability TrendsQuantitive Time Series Analysis of Malware and Vulnerability Trends
Quantitive Time Series Analysis of Malware and Vulnerability Trendsamiable_indian
 
Always on les solutions de haute disponibilité avec sql server 2012 (dat302)
Always on les solutions de haute disponibilité avec sql server 2012 (dat302)Always on les solutions de haute disponibilité avec sql server 2012 (dat302)
Always on les solutions de haute disponibilité avec sql server 2012 (dat302)Christophe Laporte
 

Destaque (17)

White Paper on Disaster Recovery in Geographically dispersed cross site virtu...
White Paper on Disaster Recovery in Geographically dispersed cross site virtu...White Paper on Disaster Recovery in Geographically dispersed cross site virtu...
White Paper on Disaster Recovery in Geographically dispersed cross site virtu...
 
Micro Datacenters Venema Advies Nigeria Limited
Micro Datacenters Venema Advies Nigeria LimitedMicro Datacenters Venema Advies Nigeria Limited
Micro Datacenters Venema Advies Nigeria Limited
 
Srdf overview latency_v.5
Srdf overview latency_v.5Srdf overview latency_v.5
Srdf overview latency_v.5
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
rtsp
rtsprtsp
rtsp
 
Disaster Recovery Deep Dive
Disaster Recovery Deep DiveDisaster Recovery Deep Dive
Disaster Recovery Deep Dive
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
disaster-recovery-online
disaster-recovery-onlinedisaster-recovery-online
disaster-recovery-online
 
Disaster Recovery- A Case Study
Disaster Recovery- A Case StudyDisaster Recovery- A Case Study
Disaster Recovery- A Case Study
 
Reference Architecture for Shared Services Hosting_SunilBabu_V2.0
Reference Architecture for Shared Services Hosting_SunilBabu_V2.0Reference Architecture for Shared Services Hosting_SunilBabu_V2.0
Reference Architecture for Shared Services Hosting_SunilBabu_V2.0
 
Implementing sql server always on
Implementing sql server always onImplementing sql server always on
Implementing sql server always on
 
Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...
Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...
Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...
 
Business Continuity Knowledge Share
Business Continuity Knowledge ShareBusiness Continuity Knowledge Share
Business Continuity Knowledge Share
 
IT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business ContinuityIT-Centric Disaster Recovery & Business Continuity
IT-Centric Disaster Recovery & Business Continuity
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Quantitive Time Series Analysis of Malware and Vulnerability Trends
Quantitive Time Series Analysis of Malware and Vulnerability TrendsQuantitive Time Series Analysis of Malware and Vulnerability Trends
Quantitive Time Series Analysis of Malware and Vulnerability Trends
 
Always on les solutions de haute disponibilité avec sql server 2012 (dat302)
Always on les solutions de haute disponibilité avec sql server 2012 (dat302)Always on les solutions de haute disponibilité avec sql server 2012 (dat302)
Always on les solutions de haute disponibilité avec sql server 2012 (dat302)
 

Semelhante a Designing a Modern Disaster Recovery Environment

The Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALThe Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALJohn Baumgarten
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankDonna Perlstein
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017Andrew Miller
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and StandardPT Datacomm Diangraha
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationAndrew Miller
 
Can your business survive the next disaster?
Can your business survive the next disaster?Can your business survive the next disaster?
Can your business survive the next disaster?Ashish Patel
 
Enterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankEnterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankactualtechmedia
 
Breaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldBreaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldInnoTech
 
N-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoveryN-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoverySolarwinds N-able
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...CloudSmartz
 
Ultan kinahan dr - minasi 2010
Ultan kinahan   dr - minasi 2010Ultan kinahan   dr - minasi 2010
Ultan kinahan dr - minasi 2010Nathan Winters
 
7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery AdministratorsQuorumLabs
 
How to plan Disaster Recovery in a five simple steps
How to plan Disaster Recovery in a five simple stepsHow to plan Disaster Recovery in a five simple steps
How to plan Disaster Recovery in a five simple stepsPawel Maczka
 
Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0DataWorks Summit
 
Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...Amazon Web Services
 
Step FWD IT - BNI SlideDeck
Step FWD IT - BNI SlideDeckStep FWD IT - BNI SlideDeck
Step FWD IT - BNI SlideDeckchrismannering
 
Cloud: The Commercial Silver Lining for Partners
Cloud: The Commercial Silver Lining for PartnersCloud: The Commercial Silver Lining for Partners
Cloud: The Commercial Silver Lining for PartnersAmazon Web Services
 
Designing Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsDesigning Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsStorage Switzerland
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperChristian Caracciolo
 

Semelhante a Designing a Modern Disaster Recovery Environment (20)

The Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALThe Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINAL
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery:  Understanding Trend, Methodology, Solution, and StandardDisaster Recovery:  Understanding Trend, Methodology, Solution, and Standard
Disaster Recovery: Understanding Trend, Methodology, Solution, and Standard
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Can your business survive the next disaster?
Can your business survive the next disaster?Can your business survive the next disaster?
Can your business survive the next disaster?
 
Enterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bankEnterprise grade disaster recovery without breaking the bank
Enterprise grade disaster recovery without breaking the bank
 
Breaking the Disaster Recovery Mold
Breaking the Disaster Recovery MoldBreaking the Disaster Recovery Mold
Breaking the Disaster Recovery Mold
 
N-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and RecoveryN-able and Arcserve® talk Backup and Recovery
N-able and Arcserve® talk Backup and Recovery
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
 
Ultan kinahan dr - minasi 2010
Ultan kinahan   dr - minasi 2010Ultan kinahan   dr - minasi 2010
Ultan kinahan dr - minasi 2010
 
7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators
 
How to plan Disaster Recovery in a five simple steps
How to plan Disaster Recovery in a five simple stepsHow to plan Disaster Recovery in a five simple steps
How to plan Disaster Recovery in a five simple steps
 
Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0Open Source Data Management for Industry 4.0
Open Source Data Management for Industry 4.0
 
Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...
 
Step FWD IT - BNI SlideDeck
Step FWD IT - BNI SlideDeckStep FWD IT - BNI SlideDeck
Step FWD IT - BNI SlideDeck
 
Cloud: The Commercial Silver Lining for Partners
Cloud: The Commercial Silver Lining for PartnersCloud: The Commercial Silver Lining for Partners
Cloud: The Commercial Silver Lining for Partners
 
Designing Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsDesigning Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT Professionals
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Designing a Modern Disaster Recovery Environment

  • 1. Eagle Technologies, Inc. © Copyright 2015 Designing a Modern Disaster Recovery Environment Balancing cost, risk and complexity in your DR strategy. Brian Anderson, Senior Systems Engineer
  • 2. Eagle Technologies, Inc. © Copyright 2015 • The importance of DR • Business Continuity ≠ Disaster Recovery • Recovery Objectives • Common DR Technologies • DR Strategies & the 3-2-1 • DR as an Insurance Policy • Recovery Service Catalog • DR Design Tips & Takeaways Overview
  • 3. Eagle Technologies, Inc. © Copyright 2015 • Natural disasters cause the most catastrophic data losses: – Hurricane Katrina and Sandy – Tornado Alley, Moore OK – 1,274 in US each year – Fires, floods, earthquakes – Only way to recover is to store a copy of data in a physically separate location • Hardware failure, human error and software corruption still make up 82% of data losses Disasters are on the rise. Is your data center protected?
  • 4. Eagle Technologies, Inc. © Copyright 2015 Recovery Site Strategies
  • 5. Eagle Technologies, Inc. © Copyright 2015 Why DR? • The nature of disasters is that they are usually unexpected. • An organization which fails to provide a minimum level of service to customers following a disaster may not have a business to recover. – Lost revenue – Damage to brand/reputation – Reduced customer satisfaction – Lost market presence – Walking papers • SANsplosion 2012!
  • 6. Eagle Technologies, Inc. © Copyright 2015 The Cost of Downtime Source: Datacenter Downtime: How Much Does It Really Cost?, Aberdeen Group, March 2012
  • 7. Eagle Technologies, Inc. © Copyright 2015 Data Protection Priorities & Spending Top 10 IT Priorities for 2014 Priority Percent Server Virtualization 54% DR / Business Continuity 46% Smartphones 41% Tablets / PCs 41% Business Intelligence / Analytics 39% Mobility 39% Network management / monitoring 38% Network-based Security 37% Virtual Server Backup 37% Encryption 36% IT Budget Growth for 2014 Priority Percent Increase by more than 10% 22% Increase by 5% to 10% 28% Increase by less than 5% 10% Same 28% Decrease by less than 5% 3% Decrease by 5% to 10% 5% Decrease by more than 10% 4% Source: CIO Magazine
  • 8. Eagle Technologies, Inc. © Copyright 2015 • Business Continuity Planning - A business continuity plan specifies how a company plans to restore core business operations when disasters occur. • Disaster Recovery - Disaster recovery looks specifically at the technical aspects of how a company can get back into operation using backup facilities. The IT department, with its disaster recovery plan, is one element of a larger business continuity scenario. Business Continuity ≠ Disaster Recovery
  • 9. Eagle Technologies, Inc. © Copyright 2015
  • 10. Eagle Technologies, Inc. © Copyright 2015 RPO vs. RTO •Amount of data loss acceptable •The point to which data must be restored RECOVERY POINT OBJECTIVE •Amount of time it takes to come back online •The time by which data must be restored RECOVERY TIME OBJECTIVE Days MinsHrsWks Secs Recovery Point Mins DaysHrsSecs Wks Recovery Time Interruption
  • 11. Eagle Technologies, Inc. © Copyright 2015 RPO vs. RTO Days MinsHrsWks Secs Recovery Point Mins DaysHrsSecs Wks Recovery Time Costs
  • 12. Eagle Technologies, Inc. © Copyright 2015 Technology Synchronous/ Semi-Sync Replication Software- defined Traditional Snapshot Replication Traditional Disk-based Backups Restores from Tape or Public Cloud Application Business Criticality Business Critical Applications Business Sensitive Applications Business Sensitive Applications Business Sensitive Applications Non-Critical Applications Disaster RPO 0-15 minutes 0-60 minutes Snap frequency based 4-24 hrs Backup frequency based 6-24 hours 36 hours Disaster RTO Less than 4 hours Less than 4 hours 4-24 hours 12-72 hours Best Effort Relative Cost $$$$ $$$ $$$ $$ $ Common DR Technologies
  • 13. Eagle Technologies, Inc. © Copyright 2015 Synchronous/Semi-Sync Replication • Typically array-based • The most aggressive RPO capable solutions • Highest cost and bandwidth requirements • Still requires traditional backup for day-to-day recovery Technology Array-Based Replication Application Business Criticality Business Critical Applications Disaster RPO 0-15 minutes Disaster RTO Less than 4 hours Relative Cost $$$$
  • 14. Eagle Technologies, Inc. © Copyright 2015 Software-defined Replication • Allows you to decouple replication process from hardware. • Solution may include DR workflow automation • May add additional costs and complexity. • Does not provide true technology gap. Technology vSphere or Software- based Replication Application Business Criticality Business Sensitive Applications Disaster RPO 0-60 minutes Disaster RTO Less than 4 hours Relative Cost $$$
  • 15. Eagle Technologies, Inc. © Copyright 2015 Traditional Snapshot-based Replication • Cost effective alternative to sync/async array-based replication. • Low recovery time and minimal data loss. • Snapshots can also provide operational recovery capabilities that can integrate with backup processes. • Typically WAN efficient, this type of replication may include dedupe capabilities Technology Replicated Snapshots Application Business Criticality Business Sensitive Applications Disaster RPO Snap frequency based 4-24 hrs Disaster RTO 12-72 hours Relative Cost $$$
  • 16. Eagle Technologies, Inc. © Copyright 2015 Traditional Backups (Disk) • Provides the most flexibility and value • Fulfill the “technology gap” requirement • A cost effective method for maintaining a large number of recovery points and high retention Technology Disk-based Backups Application Business Criticality Business Sensitive Applications Disaster RPO Backup frequency based 6-24 hours Disaster RTO 12-72 hours Relative Cost $$
  • 17. Eagle Technologies, Inc. © Copyright 2015 • Tape is not dead! • May still have legitimate place in your data protection scheme • Excellent way to get data offsite • Certain situations may dictate tape – Poor WAN connectivity/bandwidth – Lack of a warm/hot site • Keep a copy onsite, take another copy offsite • Recovering large datasets may take a significant amount of time. Traditional Backups (Tape) Technology Restores from Tape Application Business Criticality Non-Critical Applications Disaster RPO 36 hours Disaster RTO Best Effort Relative Cost $
  • 18. Eagle Technologies, Inc. © Copyright 2015 • Bandwidth is a huge factor in the success of cloud backup & restore. – Recovering large datasets may take a significant amount of time. • Performance & privacy issues remain. • Potential hidden costs compared to alternatives (not necessarily the lowest cost) Public Cloud Backup Technology Restores from Cloud Application Business Criticality Non-Critical Applications Disaster RPO 36 hours Disaster RTO Best Effort Relative Cost $
  • 19. Eagle Technologies, Inc. © Copyright 2015 Disaster Recovery Strategies Lots of options! • Tapes onsite • Tapes in the boss's garage (or Iron Mountain) • Replicate data to your DR site • Replicate data to a third-party data center (CoLo, IaaS) • Back up data to the cloud • Software replication between dissimilar SAN hardware
  • 20. Eagle Technologies, Inc. © Copyright 2015 Days MinsHrsWks Secs Mins DaysHrsSecs Wks Determining Your Recovery Needs Recovery Point Recovery Time Tape/Cloud Restore Clustering Snapshots Sync/Semi-Sync Replication Tape/Cloud Backup Disk-based Backups Periodic Snapshots & Replication Disk- based Backups
  • 21. Eagle Technologies, Inc. © Copyright 2015 The “3–2–1” Strategy • Keep your data in 3places • Keep your data on 2disparate types of hardware/software/firmware – ”Technology Gap” • Keep 1copy of your data offsite
  • 22. Eagle Technologies, Inc. © Copyright 2015 The “3–2–1” Strategy
  • 23. Eagle Technologies, Inc. © Copyright 2015
  • 24. Eagle Technologies, Inc. © Copyright 2015 • Risk Management – Avoid – Mitigate – Transfer – Accept • What is the cost of being out of business (30 minutes, 4 hours, 72 hours)? – Calculate the cost of downtime in your organization. • DR solutions need to make business sense. – Would you spend 1 million dollars on an insurance policy that pays 1 million dollars? • Don’t flush your IT budget down the toilet! DR is an Insurance Policy
  • 25. Eagle Technologies, Inc. © Copyright 2015 Cost of DR No RecoveryLow Downtime High Cost Low Cost Minimize Cost!
  • 26. Eagle Technologies, Inc. © Copyright 2015 • 80% of surveyed environments indicated that data needs to be restored within 72 hours • 34% of surveyed environments indicated that data needs to be restored within 4 hours • Balancing cost against RTO requires understanding of your application’s RTO/RPO requirements Defining Recovery Objectives 2012 Gartner, Survey Analysis: IT Disaster Recovery Management Spending and Testing Activities Expand in 2012
  • 27. Eagle Technologies, Inc. © Copyright 2015 Align your business needs with your backup and DR solutions. • Define your business critical applications & services. – What services are core to your business (customer facing, revenue generating)? – Lost revenue = critical systems • Work with stakeholders to define: – How long of a service disruption you can suffer through? – How much data could you afford to lose? • Define tiers for your services (RTO & RPO) – What effect would an outage have on your business (1 hour, 4 hours, 72 hours)? Recovery Service Catalog
  • 28. Eagle Technologies, Inc. © Copyright 2015 – Strive to have as few tiers as possible • Time and money always accompany complexity – Document your risks and plan. • Get approval from up the chain. – Maintain your plan • Assign a senior-level position • Regular tests and reviews are important – A solid recovery service catalog enables other components of DR planning • Forces discussions about Business Continuity • Recovery Priorities • Run Book Recovery Service Catalog(cont.)
  • 29. Eagle Technologies, Inc. © Copyright 2015 1. Identify Services 2. Analyze Business Impact 3. Evaluate & Choose Recovery Objectives 4. Document 5. Get Approval 6. Implement 7. Maintain  Test, Test, Test! Recovery Service Catalog(cont.)
  • 30. Eagle Technologies, Inc. © Copyright 2015 DR Design Tips • Unified Backup/Management – Islands of disparate technology are an operational obstacle for maintaining and managing DR – Point solutions create complexity and uncertainty • Reduced storage consumption with shared indexes and deduplication databases – Enable disk-based backups with long-term retention • Management tool must be flexible to business change – Be as prepared as you can be to support new applications and services
  • 31. Eagle Technologies, Inc. © Copyright 2015 • Pre-position data – Datasets are getting too large for alternate methods • Automate DR workflows when possible – If not, create a run book documenting steps • Align with a technology partner that is invested in your DR success – I have one I can recommend ;) DR Design Tips(cont.)
  • 32. Eagle Technologies, Inc. © Copyright 2015 Takeaways • If you work in IT long enough, you will encounter a large-scale outage. – Be prepared! • Business Continuity is not the same as DR – Encourage your organization at large to build a business continuity plan. • Understand recovery objectives and the methodstechnologies that enable your business to meet them. • Simplify whenever and wherever you can! – Unify the backup & restore process, this includes the management of those technologies that enable DR. – Workflow, automation, run books… these are your friends. 
  • 33. Eagle Technologies, Inc. © Copyright 2015 Takeaways (cont) • Consider the danger of incremental decisions over time – Build a blueprint and attempt to stick to it. • Don’t forget the 3-2-1! – Data in 3 places, – on two disparate pieces of hardware/software, – with at least one copy off-site. • DR is an insurance policy! – You need to spend wisely. – Calculate the cost of downtime for your organization. – Building a recovery service catalog will enable you to make wise decisions.
  • 34. Eagle Technologies, Inc. © Copyright 2015 Got questions? We’ve got answers. 35
  • 35. Eagle Technologies, Inc. © Copyright 2015 Thank you! Brian Anderson Senior Systems Engineer brian.anderson@eagleinc.com
  • 36. Eagle Technologies, Inc. © Copyright 2015 We’re making technology easy.

Notas do Editor

  1. Common DR Technologies that allow you to pre-place data.
  2. There are many reasons for this spike in disaster declarations; one of which is undoubtedly the growing sensitivity we have towards the impact of environmental factors on our national infrastructure. Computer technology has become a critical component for the way businesses manage their supply chain, market and sell to customers, as well as communication.
  3. Don’t turn a deaf ear… do you know if your organization is actually protect? - Took over DC -> no VM backups… SQL jobs were inconsistent… Primary San as target… tape library next to it
  4. Laggard: a person who makes slow progress and falls behind others. The cost of downtime is greatly increasing! There has been a 38% increase in the cost per hour of downtime. Interestingly enough, 42% of “best-in-class” reported no outages in the last year. Not all companies can afford, or need, the infrastructure that is required for “best-in-class” performance, but even moving to the middle of the pack can save your business a lot of cash.
  5. DR is a focus, but the fiscal backing is not there to do much about it Research shows that improving disaster recovery is a top focus for most companies.
  6. Business continuity is the activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions. These activities include many daily chores such as project management, system backups, change control, and help desk. Business continuity is not something implemented at the time of a disaster; Business Continuity refers to those activities performed daily to maintain service, consistency, and recoverability. The foundation of business continuity are the standards, program development, and supporting policies; guidelines, and procedures needed to ensure a firm to continue without stoppage, irrespective of the adverse circumstances or events. All system design, implementation, support, and maintenance must be based on this foundation in order to have any hope of achieving business continuity, disaster recovery, or in some cases, system support. Business continuity is sometimes confused with disaster recovery, but they are separate entities. Disaster recovery is a small subset of business continuity. It is also sometimes confused with Work Area Recovery (due to loss of the physical building which the business is conducted within); which is but a part of business continuity. The term Business Continuity describes a mentality or methodology of conducting day-to-day business, whereas business continuity planning is an activity of determining what that methodology should be. The business continuity plan may be thought of as the incarnation of a methodology that is followed by everyone in an organization on a daily basis to ensure normal operations.
  7. We’ll be discussing backup and disaster recovery specifically today. BC planning is very complicated, and has as much to do with people as it does with technology.
  8. RPO = Snapshots RTO = Replication RPO/RTO are separate… - each application can have different RPOs & RTOs Webfarm = high RPO / low RTO (must be online 24/7) PO App = low RPO (cannot lose data) / higher RTO (paper form until servers are up)
  9. (Joking) At Eagle, we love it when you don’t do you homework & have a gut reaction to wanting a 0/0 b/c it costs a lot of $$... Only joking, we would actually take the time to help educate you to make the best decision for your environment.
  10. **add defined lines between technology solutions, add numbers to them, describe what you are about to do Disaster Recovery is not just for storage, you typically need to factor servers, networks, workstations, and mobile devices. We are going to focus on storage for this presentation however.
  11. Who is doing this?
  12. Who’s doing this? Higher level of Intelligence about your environment --> invidual VM restores / Workflow automation More layers to the onion to troubleshoot
  13. Who’s doing this?
  14. Who’s doing this? Not really adequate for modern growing datasets
  15. Who’s doing this? Transitioned from Backup to Archive - cost effective - easiest to get offsite (trunk of car – “offsite” is actually “onsite” from 8-5… Iron mtn) RTO is killed (restore times are unfeaseable)
  16. Who’s doing this? No different than tape (for restoring purposes) - do the math or put a TB in the cloud & try to recover it - Dataset / internet pipe = recovery time
  17. So many options! What is right for you depends heavily on you budget, your data, and your service-level agreements.
  18. Stick on this a little bit longer so folks can consume the content. Ask for questions here.
  19. Your site may dictate which DR technologies you can leverage.
  20. Mention the 3-2-1
  21. Mention the 3-2-1
  22. Until your organization understands the size and scope of any potential impact in cannot define a DR plan that makes good business sense. Investing a hundred thousand dollars into your DR plan only makes sense if the cost of a business interruption is measured in hundreds of thousands of dollars as well. What is the cost of being out of business for 4 hours? Your DR solution needs to make business sense, otherwise you are just spending money and playing with technology. Don’t fall into the trap of disconnecting DR solutions from what makes good business sense. “Try not to get enamored with tech and a 35 second RTO”.
  23. Pick the right technology! A spare no expense approach does not make good business sense. Don’t fall victim to becoming enamored by technology and near-zero recovery objectives.
  24. Balancing cost against the time to recover (RTO) requires an in-depth understanding of your application’s RTO/RPO requirements and the technologies needed to meet them. My point is not to encourage folks to cheap-out on DR, there are justifiable use cases for architecting around zero time recovery objectives. What we do at EAGLE is attempt to understand your environment so we can architect something that makes good business sense. Mention my async blunder; ask if anyone else has screwed-up like that.
  25. Ask for questions here.
  26. Operational efficiency is typically where large cost savings are realized.
  27. Successful companies embrace a multi-tiered catalog of recovery technologies connected by a unified management platform. This approach enables IT departments to continuously balance cost vs. risk and protect data accordingly.
  28. Let me know if you want a copy of the presentation!
  29. Reiterate: The way we see it, our job is to take the complex and make it simple… that means adding real value by leveraging our expertise and integration capabilities to help you find a solution that makes sense for your business. And now, with our new solutions, if that means customer-managed \ on-prem, Eagle-managed \ Eagle-prem, or somewhere between, we have you covered.